Security Log Management : Identifying Patterns in the Chaos
Jacob Babbin
Download Now
Format: eBook (PDF)
Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
James C Foster
Download Now
Format: eBook (PDF)
Information Security Best Practices : 205 Basic Rules
George L Stefanek
Download Now
Format: eBook (PDF)
Disappearing Cryptography : Information Hiding: Steganography & Watermarking
Peter Wayner
Download Now
Format: eBook (PDF)
Network Security Assessment: From Vulnerability to Patch
Steve Manzuik
Download Now
Format: eBook (PDF)
Trojans, Worms, and Spyware : A Computer Security Professional's Guide to Malicious Code
Michael Erbschloe
Download Now
Format: eBook (PDF)
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
David Maynor
Download Now
Format: eBook (EPUB)
The Best Damn Cybercrime and Digital Forensics Book Period
Anthony Reyes
Download Now
Format: eBook (PDF)
Managing Catastrophic Loss of Sensitive Data : A Guide for IT and Security Professionals
Constantine Photopoulos
Download Now
Format: eBook (PDF)
OS X Exploits and Defense : Own it...Just Like Windows or Linux!
Chris Hurley
Download Now
Format: eBook (PDF)
TechnoSecurity's Guide to E-Discovery and Digital Forensics : A Comprehensive Handbook
Jack Wiles
Download Now
Format: eBook (PDF)
Disappearing Cryptography : Information Hiding: Steganography and Watermarking
Peter Wayner
Download Now
Format: eBook (EPUB)
Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit
Jesse Varsalone
Download Now
Format: eBook (EPUB)
Cyber Crime and Cyber Terrorism Investigator's Handbook
Babak Akhgar
Download Now
Format: eBook (EPUB)
Data Hiding Techniques in Windows OS : A Practical Approach to Investigation and Defense
Nihad Ahmad Hassan
Download Now
Format: eBook (EPUB)